BLACKbox Twin Turbo T
BLACKbox Software is designed for the enterprises
BLACKbox Software is developed on the assumption that
- Even if the enterprise has invested in the file server, its digital assets (documents, spreadsheets, designs, drawings, emails, ERP data) still need to be fully centralized. Enterprise needs some software tool to enable the file server to centralize data from desktops forcefully.
- Investment in File Server still keeps enterprise digital assets vulnerable towards data theft over USB, Emails, Internet.
In nutshell, BLACKbox is designed to preserve and secure digital assets to ensure business continuity and competitiveness.
How does BLACKbox Software help enterprises to achieve business continuity goals?
BLACKbox Software empowers existing file server to help organization to achieve business continuity goals by
- Forced Centralization of Data
- Automatic Backup and Versioning of Data
- Pushing the Data-on-Data Center to provide for Disaster Response
How does BLACKbox Software help enterprise to ensure Competitiveness?
BLACKbox Software empowers existing file servers to help the organization ensure their competitiveness by
- Protecting Data Theft over USB, Email or Internet
- Enabling organizations to devise systems that can detect Data Theft attempts
Features of BLACKbox Software
Innovative Data Centralization for Business Continuity
1BLACKbox empowers your file servers to forcefully centralize digital assets which otherwise, a traditional file server cannot do.
BLACKbox solves the most common challenge with traditional file servers for data centralization. Traditional file servers configured for data centralization cannot store all data if users do not save files on the file server. Traditionally, users can save (read scatter) data on their local computers. BLACKbox software empowers existing file servers to innovatively force users to save data on themselves so that users are not given a choice to save files on any other location but the existing file server.
BLACKbox software complements your existing server and ensures digital assets are not scattered on desktops. This is the first step to achieving business continuity through data preservation. When an enterprise is sure that all its data is centralized in one place, it is straightforward to provide a backup strategy.
2Innovative Folder Structure Enforcement for Business Continuity
BLACKbox software solves another common challenge with traditional file servers. BLACKbox software can empower traditional file servers to profile enterprise users to use specific folder structures only. Users are allowed to save data within the defined folder structure. This empowers traditional file servers to organize data in a better manner in the predefined folder structure.
3Vault and Workspace Method for Business Continuity
BLACKbox software empowers existing file servers to provide a vault for archived data for any time reference for the users. It also provides a workspace for ongoing projects. It also provides a moderator role to the user who can transfer finished projects/files/documents to the vault. Users can only refer to data in the vault but can't change it.
4Automatic Backup of Forcefully Centralized Data on Data Center or Media for Business Continuity
All data forcefully centralized on your file server by BLACKbox software is backed up on desired media or data center. BLACKbox software also takes backup of designated folders from the enterprise's ERP server. By pushing data to the data center, BLACKbox software provides business continuity post-disaster situation.
5Versioning of Data Backup to minimize impact of Ransomware or Data Manipulation for Business Continuity
BLACKbox software empowers the existing file servers to maintain many versions for the backup on desired media and the data center. Ransomware or any manipulation of data will corrupt the latest version of the data. In such an event, the enterprise can always restore data from the previous version on a file server, media or data center.
6Domain Policies for Information Security
BLACKbox software enforces specific enterprise policies on users so that they cannot manage LAN, cannot install new Software, and cannot change specific crucial system settings of the computer. Instead, they are provided with application rights relevant to their job profile and can compute only to the extent admin has allowed. This avoids using complex ADS on Windows-based file servers.
7Email Server with Innovative Email Shadowing for Business Continuity
BLACKbox software loaded on your file server acts as a full-fledged mail server with innovative email shadowing technology. Typically, users use email clients in which emails are stored as pst or such files. These files are prone to corruption and can cause email data loss. BLACKbox software loaded on your existing file server acts as a full-fledged mail server that shadows every email coming in or going out from itself, that too user-wise and date-wise. So, if the user finds a corrupt pst or such file, the admin can restore all in-out emails in minutes.
8Email server with Innovative Vigilance for Information Security
BLACKbox software loaded on your server acts as a full-fledged mail server, which provides vigilance controls on email communication. You can define an email user's policies on where they can or cannot send an email and what they can or cannot send emails to suit your information security requirements.
9Email server with Innovative BCC intercept for Information Security
BCC (Blind Carbon Copy) is an easy way to leak data from an enterprise. BLACKbox software loaded on your server intercepts BCC, allows or disallows as per policy and submits reports to designated users with the content of email and recipients in BCC.
10Innovative Dual Password System in Email Server for Information Security
BLACKbox software loaded on your server uses innovative dual password technology to prevent email identity theft-induced fraud.
11Innovative USB drive policies with report generation for Information Security
BLACKbox software loaded on your file server and desktops/laptops make all USB ports of connected computers "smart". Enterprise can define policy on USB usage for keyboards, mice, and printers and deny usage of USB by pen drives, hard drives, and mobile phones on USB. It can also define a policy that data can be brought into the enterprise network over USB but cannot be taken out on USB. It can also define a policy where entrusted users can take data out on USB, but a report is generated and sent to designated users for evidence.
12Innovative Screen Capture and Play Back for Fraud Investigation
BLACKbox software loaded on your server and desktops can capture screens of every computer and store it for months for playback in future. If an enterprise suspects any fraud on a specific computer and wants to play back what happened weeks or months ago, it can do it. This empowers enterprises with the capability to investigate any fraud.
13Innovative Happy Hours in Firewall for Information Security
BLACkbox software loaded on your server acts as a software firewall for your network and controls internet usage for users. Admin can define internet policies for each user. It also works on the concept of happy hours, which gives users full access to the internet during happy hours but also isolates enterprise data so it cannot be infiltrated into the internet.
14Innovative Hybrid Cloud Technology for Laptops and Branch Offices
BLACKbox software can also be available as Software as a Service on the cloud by which all the policies can be enforced on laptops and branch office computers which are not connected to your server. However, all the above features can be implemented on Laptops and Branch Computers through agents (client side) and servers (BLACKbox on the cloud).